CVE-2020-1738

NameCVE-2020-1738
DescriptionA flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ansible (PTS)buster2.7.7+dfsg-1+deb10u1vulnerable (unimportant)
buster (security)2.7.7+dfsg-1+deb10u2vulnerable (unimportant)
bullseye2.10.7+merged+base+2.10.8+dfsg-1vulnerable (unimportant)
bookworm7.3.0+dfsg-1vulnerable (unimportant)
sid7.7.0+dfsg-3vulnerable (unimportant)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ansiblesource(unstable)(unfixed)unimportant

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1802164
https://github.com/ansible/ansible/issues/67796
Marked unimportant as for exploitation it requires already a remote that is
compromised, cf. https://github.com/ansible/ansible/issues/67796#issuecomment-614656017

Search for package or bug name: Reporting problems